class 8 introduction to anonymity cis 755: advanced computer security spring 2015 eugene vasserman...

36
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman http://www.cis.ksu.edu/~eyv/CIS755_S 15/

Upload: hester-scott

Post on 03-Jan-2016

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Class 8Introduction to Anonymity

CIS 755: Advanced Computer SecuritySpring 2015

Eugene Vasserman

http://www.cis.ksu.edu/~eyv/CIS755_S15/

Page 2: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Administrative stuff

• Monday office hours moved to 2:30– Will be 2:30 – 4

• How was your break?

• Quiz graded– Discussion

Page 3: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Anonymity Concepts

• Privacy– Confidentiality

• Anonymity/Pseudonymity– Unobservability– Unlinkability

Page 4: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Properties of eCash

• Unforgeability

• Non-reusability

• Anonymity– Untraceability– Unlinkability

Page 5: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Dining Cryptographers

• Three people toss coins: heads=1, tails=0• Menus hide right-hand coin• XOR your coin flip result and left

neighbor’s result• Report value to everyone• Report opposite value to send a single bit• If the sum is odd, someone sent a message

Page 6: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Dining Cryptographers II

• Slow• Error-prone• Needs tamper detection• Does not scale• Provides unobservability

Page 7: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Unobservability

• k-anonymity (scalable dining cryptographers)– Must be implemented very carefully

• Link padding– Inefficient– Cover traffic knowledge

Page 8: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Unlinkability

• Sender X Receiver(Sender can’t identify receiver)

• Sender X Receiver(Receiver can’t identify sender)

• Sender X Receiver(Neither knows who the other is)

– How do we handle authentication?

• Unobservability implies unlinkability (?)

Page 9: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

For Bob For Bob from Alicefrom AliceFor Carol For Carol from Alicefrom AliceFor David For David from Alicefrom Alice

Onion Encryption

Page 10: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Source routing with capabilities

B, dataS3S2S1 B

S3

S2

S1

A

Page 11: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Message for BobWrapping for CarolWrapping for Doug

Onion Encryption IIBob

Alice

Wrapping for Edward

Edward

Doug

Carol

Page 12: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Chaum MixesBob

Alice

Output in lexographic order

Page 13: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Global AdversaryBob

Alice

Page 14: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Chaum Mix CascadeBob

Alice

Page 15: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Anonymous Reply

• Address for replies:

• Reply:

• Mix0 decrypts N,A; sends:

• Mix decrypting reply does not know destination• Mix encrypting reply does not know source

Page 16: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Mixminion

A

B

C

D

E Bob

A,B,C,D,E

Alice

Bob

Page 17: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Problems with Mixminon

• Centralized entities required– Availability failure– Anonymity failure (how?)

• Malicious nodes:– Control entry and exit– Unlikely

Page 18: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Anonymous Email

• High-latency• Low-throughput• Provides unlinkability

– Have to be careful about authentication

• No default end-to-end confidentiality (PGP)– Actually, there is for replies

• Secure against global adversary

Page 19: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Anonymous Web Browsing

• Low-latency• Medium-throughput• Server does not know client• Provides sender unlinkability

– Have to be careful about authentication

• No default end-to-end confidentiality (SSL)• NOT secure against global adversary

Page 20: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Tor

A

B

C

TCP over TCP (UGH!)

Page 21: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15
Page 22: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Anonymous Web Services

• Web service does not know client• Client does not know web service• Provides sender and receiver unlinkability

• Rendezvous

Page 23: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Tor Hidden Services

A

B

C

D

E

F

Page 24: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Problems with Tor

• Global adversary– What are the possible attacks?– Long term intersection– Defined as NOT HANDLED by Tor– Functional vs. actual?

• Packet counting

• Packet sampling

Page 25: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Problems with Tor

• “Centralized” entities required– Availability failure– Anonymity failure (how?)

• Malicious nodes:– Control entry and exit

• Hopefully unlikely – entry guards

• Preferential attraction of clients– Eureka! We can lie!

Page 26: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Problems with Tor II

• Information leakage from software– Web browser language– System time– How else?

• Malicious attacks on software– How?

Page 27: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Problems with Tor III

• Information leakage from design:– Latency (Hopper et al.)

• Unlinkability failure:– Latency (Hopper et al.)

• See a pattern?• Prevention?

Page 28: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Global AdversaryBob

Alice

Mix serverMix

server

Page 29: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Global Adversary vs. TorBob

Alice

Entire Tor

network

Entire Tor

network

Page 30: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Problems with Tor

• Preferential attraction of clients– Eureka! We can lie!

• Information leakage from software• Information leakage and linkability failure

from latency (Hopper et al.)• Malicious nodes

– Control entry and exit• Hopefully unlikely – entry guards

Page 31: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Tor Network Positioning Attack

A

B

C

M

Page 32: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Tor Linkability Attack

A

B

C

Page 33: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Tor Selective DoS Attack

A

B

C

Page 34: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Tor reliability

• RDoS = (1-t)2 + (tf)3

(1-t)2 dominates

Page 35: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

A defense – entry guards

Useful, but ≤ 3 guards may decrease resilience

Othermixes

Page 36: Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman eyv/CIS755_S15

Questions?

Reading discussion